General

  • Target

    MDE_File_Sample_44e5b34094809f4141e19b46522141f88d86c9ba.zip

  • Size

    3.2MB

  • MD5

    be191c7835abc92df18b2c1d9703e31c

  • SHA1

    9bc82b035e7e60588c1c0fe1ce81784ce9e62b20

  • SHA256

    1d99c9f433426e8097b7ac5a79f9a1299a105566d6d2c451e0ebe0d36704b1cb

  • SHA512

    12ddb13304bf601735ad08b60fb5104cd45e64af8e74fb30f09f63aa73ff08507a2561c2da468d32bf36436f6272bffeafa48d044d162eb01fb690010f5120f7

  • SSDEEP

    98304:h3innapOfE3tGue2lP5vhPUEyxHw9PpD0Pyd3TLvYqI:h36apOfE3tLdlxpsE2HAhDWyhTLA9

Score
N/A

Malware Config

Signatures

Files

  • MDE_File_Sample_44e5b34094809f4141e19b46522141f88d86c9ba.zip
    .zip

    Password: infected

  • Defender detected and quarantined 'PUABundler:Win32/CandyOpen' in file 'BW test - 1.msg->(Ole Stream 7)->winscp438setup-sponsored.exe' during a scheduled scan
    .exe windows x86


    Code Sign

    Headers

    Sections